Skip to content

Commit fd8ca84

Browse files
committed
trustbundles: KEP cleanup
- remove mentions of deferred behavior - typo fixes
1 parent a09b80d commit fd8ca84

File tree

1 file changed

+3
-9
lines changed
  • keps/sig-auth/3257-cluster-trust-bundles

1 file changed

+3
-9
lines changed

keps/sig-auth/3257-cluster-trust-bundles/README.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -346,10 +346,6 @@ Kubelet in the cluster. When they are updated, workloads will need to receive
346346
the updates fairly quickly (within 5 minutes across the whole cluster), to
347347
accommodate emergency rotation of trust anchors for a private CA.
348348

349-
Security: Should individual trust anchor set entries designate an OCSP endpoint
350-
to check for certificate revociation? Or should we require the URL to be
351-
embedded in the issued certificates? Note: This question is deferred from the 1.30 beta scope, and will be discussed as an addition to the beta scope in 1.31.
352-
353349
## Design Details
354350

355351
### ClusterTrustBundle Object
@@ -375,18 +371,16 @@ as long as their name does not contain a colon.
375371
Multiple ClusterTrustBundle objects may be associated with a single signer.
376372
While each object is independent at the API level, consumers (mostly Kubelet)
377373
will select trust anchors by a combination of field selector on signer name, and
378-
a label selector. Signer controllers may follow the convention of making the
379-
label selector `kubernetes.io/cluster-trust-bundle-version=live` correspond to a
380-
meaningful set of trust anchors. In general, users are expected to read the documentation for their signer controller implementation in order to determine which label selectors to use for their needs, including [canarying](#canarying-changes-to-a-clustertrustbundle).
374+
a label selector. In general, users are expected to read the documentation for their signer controller implementation in order to determine which label selectors to use for their needs, including [canarying](#canarying-changes-to-a-clustertrustbundle).
381375

382376
ClusterTrustBundle objects support `.metadata.generation`.
383377

384378
ClusterTrustBundle creates and updates that result in an empty
385-
`.spec.pemTrustAnchors` will be rejected during validation.
379+
`.spec.trustBundle` will be rejected during validation.
386380

387381
All of the new objects and fields described in this section are gated by the
388382
ClusterTrustBundle kube-apiserver feature gate. Unless the feature gate is
389-
enabled, usage of these alpha objects and fields will be rejected by
383+
enabled, usage of these objects and fields will be rejected by
390384
kube-apiserver.
391385

392386
#### API Object Definition

0 commit comments

Comments
 (0)